HELLO, Visitor

Wireless and Bluetooth hacking

Go down

Wireless and Bluetooth hacking

Post by winda on Sat Oct 15, 2011 12:15 am


Wireless networks are continually growing in our modern world and society. This 2 day course aims to demystify wireless network security and inform attendees on how to improve wireless LAN security and Bluetooth security. This will be achieved via theory and practical. Attendees will first obtain detailed theoretical analysis of different wireless security schemas (i.e. Theory), thereafter have hands on experience in how the attacks are performed (i.e. Practical).

Agenda


Day 1 - Wireless
Introduction to Wireless Hacking


Wireless and its technology usage
Wireless networking breakdown
Security of wireless and progression
What is wardriving?
Attacking wireless brief


Wireless Protocols and Architecture


Analysis of various wireless protocols
Wireless architecture and design
802.11 Protocol Analysis


Network Mapping and Methodology for securing wireless networks


Discovery of wireless networks


Antenna variations
Monitoring the wireless network, including packet analysis
Various toolsets including Netstumbler, Kismet, the Aero suites and so fourth


Wireless hacking tools and attacks


Traffic injection tools
Spoofing
Flooding

Aircrack and Aero suite of tools
Airsnort
WEP hacking cracking
WPA, WPA2 hacking techniques
Frame generation


Day 2 -Bluetooth
Introduction to Bluetooth


What is Bluetooth?
What does it allow for?
How Bluetooth works
Bluetooth data rates
Bluetooth ranges and specifications
Introduction Bluetooth security (Scatternets)
Latest developments with Bluetooth


Bluetooth vulnerabilities overview


The Snarfing attack
The Bluebug attack
The backdoor attack
Bluechop
Bluedump
Bluebump
Bluesmack
The social engineering factor
Bluetooth viruses
Bluetooth implementation problems


Bluetooth hacking tools and techniques


BTscan , Bluestumbler , Bluescan , BT Browser
Bluesnarf
Bluebug
Bloover II
Carwhisperer
Blueprinting (SDP tool)
Brute force discovery - Redfang
Optimising range of Bluetooth attacks


Defending against Bluetooth attacks


Bluetooth recommendations
Standard organizations practice
The future for Bluetooth security and implementations

avatar
winda
Calon Penduduk Cyber
Calon Penduduk Cyber

Jumlah posting : 19
Points : 2543
Reputation : 4
Join date : 14.10.11

http://www.cyber.forum-canada.com

Kembali Ke Atas Go down

Kembali Ke Atas

- Similar topics

 
Permissions in this forum:
Anda tidak dapat menjawab topik